lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20160325184756.GA5212@pisco.westfalen.local>
Date: Fri, 25 Mar 2016 19:47:56 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3530-1] tomcat6 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3530-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 25, 2016                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tomcat6
CVE ID         : CVE-2013-4286 CVE-2013-4322 CVE-2013-4590 CVE-2014-0033 
                 CVE-2014-0075 CVE-2014-0096 CVE-2014-0099 CVE-2014-0119
                 CVE-2014-0227 CVE-2014-0230 CVE-2014-7810 CVE-2015-5174
                 CVE-2015-5345 CVE-2015-5346 CVE-2015-5351 CVE-2016-0706
                 CVE-2016-0714 CVE-2016-0763

Multiple security vulnerabilities have been fixed in the Tomcat servlet
and JSP engine, which may result on bypass of security manager
restrictions, information disclosure, denial of service or session
fixation.

For the oldstable distribution (wheezy), these problems have been fixed
in version 6.0.45+dfsg-1~deb7u1.

We recommend that you upgrade your tomcat6 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=qOb5
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ